Ask HN: Boring but important tech no one is working on | Hacker News
Tech
Purple Academy by Picus - Courses for Red, Blue, and Purple Teamers
Purple Academy by Picus provides free cybersecurity courses around Red, Blue and Purple Teaming topics. Successful students earn certificates and CPE credits.
SecZetta/secure-coding-standards: Checklist of security precautions for Ruby on Rails applications.
Checklist of security precautions for Ruby on Rails applications. - GitHub - SecZetta/secure-coding-standards: Checklist of security precautions for Ruby on Rails applications.
security-guide-for-developers/security-checklist.md at master · FallibleInc/security-guide-for-developers · GitHub
Security Guide for Developers (实用性开发人员安全须知). Contribute to FallibleInc/security-guide-for-developers development by creating an account on GitHub.
Privacy Tools List by CHEF-KOCH | CHEF-KOCH's Microblog ✨
The biggest Privacy Resource list you can find on the Internet.
How to increase Cyber Awareness within a large organisation : cybersecurity
53 votes and 49 comments so far on Reddit
Preventing the Next Major Security Breach (Cloud Next '18) - YouTube
Docker has revolutionized the way we package and deploy software to the cloud. However, when it comes to securing our applications, we have many of the same old challenges. How do we know the software we’re running is secure? When new vulnerabilities come up, how can we roll out fixes quickly, and without service interruptions? In this talk we’ll talk about Google’s approach to securing your build pipeline, detecting vulnerabilities in production, and, of course, methods to prevent vulnerabilities from ever getting there.
SEC208
Event schedule → http://g.co/next18
Watch more Security sessions here → http://bit.ly/2zJTZml
Next ‘18 All Sessions playlist → http://bit.ly/Allsessions
Subscribe to the Google Cloud channel! → http://bit.ly/NextSub
re_ty: Publish; product: Cloud - General; fullname: Justin Beckwith; event: Google Cloud Next 2018;
Binary Authorization | Google Cloud
Deploy-time security control that uses signature validation to ensure only trusted container images are deployed to Google Kubernetes Engine.
How important is split-horizon DNS? - Information Security Stack Exchange
Split DNS returns different results depending on the source IP.
It's commonly promoted as significant security measure for internal resources, for limiting enumeration and discovery.
I've had many
Latacora - The SOC2 Starting Seven
So, you plan to sell your startup’s product to big companies one day. Congratu-dolences! Really, that’s probably the only reason you should care about this article. If that’s not you, go forth and live your life! We’ll ask no more of your time. For the rest of you: Industry people talk about SOC2 a lot, and it’s taken on a quasi-mystical status, not least because it’s the product of the quasi-mystical accounting industry.
gcp - Cloudberry Engineering
Hardening your cluster's security | Kubernetes Engine Documentation | Google Cloud
Kubernetes Engine access and audit - Google Cloud Platform - Community - Medium
Adventures in Kubernetes
11 Ways (Not) to Get Hacked - Kubernetes
Author: Andrew Martin (ControlPlane) Kubernetes security has come a long way since the project's inception, but still contains some gotchas. Starting with the control plane, building up through workload and network security, and finishing with a projection into the future of security, here is a list of handy tips to help harden your clusters and increase their resilience if compromised. Part One: The Control Plane 1. TLS Everywhere 2. Enable RBAC with Least Privilege, Disable ABAC, and Monitor Logs 3.
Security Basics for your first Kubernetes Cluster
So you built a cluster. Maybe you have some apps deployed. You’re sold on this whole Kubernetes thing. Now what do you do?
9 Kubernetes Security Best Practices Everyone Must Follow - Cloud Native Computing Foundation
By Connor Gilbert, product manager at StackRox Last month, the Kubernetes ecosystem was shaken by the discovery of the first major security flaw in Kubernetes, the world’s most popular container…
Viewing vulnerabilities and threats in Cloud Security Command Center | Cloud Security Command Center | Google Cloud
Protecting cluster metadata | Kubernetes Engine Documentation | Google Cloud
Using Firewall Rules Logging | VPC | Google Cloud
Kubernetes Network Policies - A Detailed Security Guide | StackRox
The container orchestrator war is over, and Kubernetes has won. With companies large and small rapidly adopting the platform, security has emerged as an important concern – partly because of the learning curve inherent in understanding any new infrastructure, and partly because of recently announced vulnerabilities.
Securing a Cluster - Kubernetes
This document covers topics related to protecting a cluster from accidental or malicious access and provides recommendations on overall security. Before you begin You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using minikube or you can use one of these Kubernetes playgrounds:
Attacking default installs of Helm on Kubernetes
Default installations of Helm on Kubernetes can make it trivial for attackers to escalate to cluster admin. In this post I’ll demonstrate how.
HTTP Strict Transport Security - Wikipedia
GitHub - OWASP/CheatSheetSeries: The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics. - GitHub - OWASP/CheatSheetSeries: The OWASP Cheat Sheet ...
Prevent users registering with passwords from data breaches
Has anyone automated security testing?
79 votes and 35 comments so far on Reddit
Hardening your cluster's security | Kubernetes Engine | Google Cloud
How To Protect SSH with Fail2Ban on Ubuntu 14.04 | DigitalOcean
Fail2ban is a daemon that can be run on your server to dynamically block clients that fail to authenticate correctly with your services repeatedly. This can…
Securely Connecting to VM Instances | Compute Engine Documentation | Go
security - How should I ethically approach user password storage for later
As I continue to build more and more websites and web applications I am often asked to store user's passwords in a way that they can be retrieved if/when the user has an issue (either to email a